Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 30

Liczba wyników na stronie
first rewind previous Strona / 2 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  information hiding
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 2 next fast forward last
1
Content available remote Adaptively Embedding Binary Data in an Image
100%
EN
In this paper, we propose an embedding algorithm, of high visual quality, that can adaptively embed a binary message into an image. The binary message to be embedded is divided into two segments, each of which is then decomposed into n+1 or n types of sub-messages (where n ^(3) 3 enables each pixel to embed a sub-message), respectively, according to the desired embedding capacity. Embedding is done by leaving the pixel value unchanged or changing it into one of its n or n-1 neighboring values according to the type of the sub-message. From the results of this study, each pixel may not embed a fixed number of message bits and the adjustment of the pixel value is minimal, thus the image quality is significantly improved by adaptively decomposing the message into sub-messages and embedding them into the host image.
2
Content available remote An Image Authentication Based on Discrete Fourier Transform
80%
EN
The advances of network technologies and digital devices facilitate users to exchange multimedia data over the public networks. However, this also raises significant concerns about how to protect sensitive multimedia data from being illegally copied and unauthorized modifications. Thus, this paper proposes a fragile watermarking method to detect illegitimate alterations of the watermarked data. The proposed method embeds a grayscale watermark image into a grayscale cover image in a block-by-block manner by using discrete Fourier transform. Experimental results show that the proposedmethod can successfully and exactly detect and localize any tampered regions of the watermarked image.
3
Content available remote On Using LSB Matching Function for Data Hiding in Pixels
80%
EN
The proposedmethod in this paper is based on the LSB matching function of Mielikainen for Steganography. However, there is a significant change with respect to Mielikainen’s method in the use of the LSB matching function to compute secret bits. Melikainen extracts secret bits in pixel pairs: the first one is the LSB of the first pixel in a pixel pair and the other is computed by a LSB matching function applied to both pixels. The proposed method does not make any partition, but makes the sequential image processing: the current secret bit is always computed by a LSB matching function where the LSB matching function is modified using only an XOR operation. To make the data extraction compatible with data embedding, the proposed method modifies sparse pixels by adding/subtracting their value to/from one. In the experimental results, the values of embedding efficiency increase while the involved bits increase. Taking test images in the experiments, the numbers of modified pixels in the proposed method are always lower than those in Mielikainen's method.
4
Content available remote Reversible Data Hiding Based on Three-Circular-Pixel Difference Expansion
80%
EN
This paper proposes a reversible data hiding scheme based on three-circular-pixel (TCP) difference expansion. To embed a message in an image, the image is divided into three-pixel blocks, each of which is, then, transformed into a TCP block with two differences. When the pixel value of the largest pixel in the TCP block is increased, two differences are increased—one is between the largest and the smallest, and the other is between the largest and the middle. Expanding the two differences in the block by increasing the largest pixel value may make the image less modified. In addition, the number of pixel pairs is increased to two thirds of the number of pixels in the image. Compared to Tian's study, both the visual quality and the embedding capacity of the image are significantly improved.
5
Content available remote An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
80%
EN
Information hiding is a technique that embeds secret data in digital media for using in a variety of applications, including ownership protection, authentication, access control, annotation and so on. In this paper, we propose an information hiding scheme based on quantization-based embedding technique to conceal information in gray-scale image. The proposed scheme was tested with a variety of gray images. According to the experimental results, hidden information can be extracted correctly and quickly from the stego image. In addition, the stego image has only a little distortion compared with the cover image. The proposed scheme can not only hide a large amount of information in the cover image, but can also repair the stego image such that the repaired image is almost the same as the cover image.
6
Content available remote Codebook Partition Based Steganography without Member Restriction
80%
EN
The practice of concealing secret messages into index-based images has generally suffered from problems of image quality degradation and hiding capacity restriction. A steganographic scheme using an improved codebook partition is proposed in this paper. The proposed scheme partitions the codebook into different member sub-clusters in terms of their similarity between the codewords for increasing the hiding capacity and reducing the image distortion. Any size of a sub-cluster was allowed in the proposed scheme, so as to improve the traditional approaches in which the size of a sub-cluster was restricted to the power of two. As a result of this revised scheme, an increased hiding capacity and a reduction in image distortion are obtained, as indicated from experimental results. The average performance of the proposed scheme is superior to that of those standard methods.
EN
In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.
8
Content available remote An Adaptive Steganographic Scheme for Color Images
80%
EN
In this paper, a new palette-based image steganography is proposed. Palette-based images such as GIF files have been widely used on the Internet and web pages such that all browsers can recognize them. Palette-based images can be used as good carriers for transmitting secret messages. In this scheme, the Least Significant Bits (LSBs) of the palette-based image are utilized in order to hide the secret message by using the computational information hiding technique. The adaptive hiding capacity can be computed according to different sizes of the embedding block. Experimental results also show that existing artifacts in the traditional LSB-based method are unnoticeable. The number of modification pixels in the embedding process is decreased, while good stego-image quality is maintained, and the cover image is left unblemished by camouflaged information. Furthermore, the feature of adaptive hiding capacity provides the possibility of protecting different sizes of embedded secret messages.
9
Content available remote An Effective Message Embedding Scheme for 3D Models
70%
EN
We present an effective message embedding scheme for 3D models. We propose the unit length as the quantizer to generate an embedding order list and an embedding index list. Our scheme considers every two elements in the embedding order list as the order pair, and we embed 3 bits of 0 or 1 secret message into the index pair associated with the order pair. The message embedding is effective requiring, at most, adding 1 to, or subtracting 1 from, the index pair. This reflects a slight perturbation of a points coordinates where the magnitude of the perturbation is no greater than one unit length. Our algorithm achieves a high embedding capacity, being 4.5 times the number of points in the point cloud models. This amount of capacity allows us to convey a 502x502 resolution of the black-and-white image into a point cloud model consisting of 56,194 points for covert communication. The capacity magnitude is 50%-75%higher than that of the current state-ofthe-art algorithms, yet the model distortion due to the message embedding is smaller than that of our counterparts. Our algorithm is robust against translation, rotation, and uniformly scaling operations. It is fast, simple to implement, and the message can be extracted without referring to the original point cloud model. We believe our scheme is appropriate for most point cloud models.
PL
W artykule przedstawiono metodę wykorzystującą 3 klucze i rozpraszanie widma do ukrywania wiadomości. Pierwszy klucz służy do opcjonalnego szyfrowania wiadomości przed jej ukryciem. Drugi klucz wykorzystywany jest do generowania pseudolosowego szumu. Wiadomość ukrywana łączona jest z szumem dając wiadomość tajną. Następnie wykonywane jest właściwe ukrycie wiadomości z wykorzystaniem klucza trzeciego.
EN
This paper presents a review of a stego key based algorithm used for hiding information into a digital image. We also present a scheme of a stego key used to threshold clasification of image blocks and selection of coeffiients of DCT transform within which information is hidden.
EN
Science 2.0 aims at using the information sharing and collaborative features of the Internet to offer new features to the research community. Science 2.0 has been already applied to computer sciences, especially bioinformatics. For network information hiding, a field studying the possibility of concealing a communication in networks, the application of Science 2.0 is still a rather uncovered territory. To foster the discussion of potential benefits for network information hiding, we provide a disquisition for six different Science 2.0 aspects when applied to this domain.
12
Content available remote A review of techniques for security information for agent approaches in networks
60%
EN
The development of communication technology has led to an increase in the risks associated with sending crucial information across a communication channel. One of the security details is defending against data theft over expanding networks by concealing sensitive information by employing agent techniques for hidden transmission. As a result, it is often used to solve data security issues. Researchers applied AI and agentbased algorithms to help secure information concealment since it may be challenging to choose the ideal cover image to conceal crucial information. The agent-based strategy and its applicability in various security information modalities are examined in this paper. This paper also discusses several important problems with creating other types of agents, such as basic reflex agents, reflex agents based on models, goal-based agents, utility-based agents, and learning agents. This paper concludes with an overview of the literature on agent-based methods for security information. The overall finding of our research is that agent-based techniques seem to be particularly fit for this area, although this still needs to be confirmed by more widely deployed systems.
PL
Rozwój technologii komunikacyjnych doprowadził do wzrostu zagrożeń związanych z przesyłaniem kluczowych informacji kanałem komunikacyjnym. Jednym ze szczegółów bezpieczeństwa jest ochrona przed kradzieżą danych w rozszerzających się sieciach poprzez ukrywanie poufnych informacji za pomocą technik agentów do ukrytej transmisji. W rezultacie jest często używany do rozwiązywania problemów związanych z bezpieczeństwem danych. Badacze zastosowali sztuczną inteligencję i algorytmy oparte na agentach, aby pomóc zabezpieczyć ukrywanie informacji, ponieważ wybór idealnego obrazu okładki w celu ukrycia kluczowych informacji może być trudny. W tym artykule przeanalizowano strategię opartą na agentach i jej zastosowanie w różnych trybach informacji o bezpieczeństwie. W tym artykule omówiono również kilka ważnych problemów związanych z tworzeniem innych typów agentów, takich jak podstawowe agenty refleksyjne, agenty refleksyjne oparte na modelach, agenty oparte na celach, agenty oparte na użyteczności i agenty uczące się. Artykuł ten kończy się przeglądem literatury dotyczącej agentowych metod uzyskiwania informacji o bezpieczeństwie. Ogólnym wnioskiem z naszych badań jest to, że techniki oparte na agentach wydają się szczególnie pasować do tego obszaru, chociaż musi to jeszcze zostać potwierdzone przez szerzej stosowane systemy.
EN
In order to provide large embedding capacity and to minimize distortion for the stegoimage, a steganographic method using multi-pixel differencing is presented in this paper. It takes into consideration four pixels of a block, and the differences between the lowest gray-value pixel and its surrounding pixels are used to determine the degree of smoothness and sharpness for embedding the secret data. If the difference values are large in a block, and the block is located in the sharp area then more data can be embedded. On the other hand, if the block is located in the smooth area less data can be embedded. The multi-pixel differencing method is employed in our scheme. We also propose the pixel-value shifting method to increase the image quality. The experimental results show that our scheme has a large embedding capacity without creating a noticeable distortion.
14
Content available Steganography – theory and practice
60%
EN
Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.
PL
W artykule dokonano analizy współczesnych konfliktów międzypaństwowych oraz kierunków rozwoju form walki zbrojnej. Pokazano, że konfrontacja charakteryzuje się różnymi formami, jest ukryta w naturze i prowadzona jest głównie w sferze politycznej, gospodarczej, informacyjnej i innych. Udowodniono, że znaczna część wojen hybrydowych to operacje informacyjne wykorzystywane do destrukcyjnego oddziaływania na społeczeństwo, biznes, politykę i ekonomię, wykorzystujące informacyjno-komunikacyjną przestrzeń i technologię. W artykule wyrażono potrzebę stworzenia teoretycznej podstawy zwalczania cyberataków w specjalnych systemach telekomunikacyjnych jako integralnej części bezpieczeństwa narodowego państwa. Opracowano metodę ukrytej informacji, a także dostarczania informacji w przesyłaniu strumieni wideo i obrazów w sieciach. Podstawowe obliczenia są podane na początkowych etapach ukrywania informacji i metod zapewnienia bezpieczeństwa cybernetycznego w systemach telekomunikacyjnych.
EN
This article presents the results of studies analyzing the relevance of some statistical measures histogram and color and Co-Occurence Matrix, whose values have the effect of reducing the visibility to hide the fact steganographic messages.
16
60%
PL
W artykule opisano techniki steganografii cyfrowej służące do ukrywania informacji w plikach obrazowych i dźwiękowych. Porównano najważniejsze cechy wpływające na bezpieczeństwo oraz praktyczne wykorzystanie tych metod. Przedstawione algorytmy znajdują zastosowanie przede wszystkim w tajnej komunikacji. Wskazano jednak na potencjał łączenia steganografii z kryptografią i innymi metodami ochrony danych.
EN
Information security plays significant role in personal and business data exchange. Digital steganography is appropriate solution in the case where undetectability of communication is required. This paper presents selected methods of image and audio steganography. First, the general schema of steganographic system and its most important properties are outlined. Next section, which describes image steganography techniques, is split into algorithms hiding data in particular pixels and in image colour palettes. This categorization is determined by file format, e.g. palettes are present only in indexed images. Audio steganography section contains a detailed description of methods dedicated to embedding data in audio samples or file structure. In the summary the main features of selected algorithms are compared to show differences in security level, usefulness and complexity of implementation. Steganography has many practical applications and can be used with cryptography or separately. The paper suggests possible directions of future studies, including combining steganography with biometric techniques in order to provide additional layer of data protection.
PL
Przedstawiono algorytmy umożliwiające zestawienie łącza steganograficznego w tle sygnału mowy, transmitowanego kanałem VolP Ukryta informacja jest wstawiana bezpośrednio do sygnału mowy, bez ingerencji w algorytm kodowania i protokoły transmisyjne. Szybkość transmisji steganograficznej wynosi 20 bit/s (bez zabezpieczenia kodem nadmiarowym) lub 10 bit/s (z zabezpieczeniem) . Łącze jest odporne na kompresję mowy (koder Speex 8000 bit/s), jej przepróbkowanie oraz (pod pewnymi warunkami) na utratę pakietów.
EN
Algorithms for acoustic steganography in speech signal, transmitted through VolP channel, are presented. Data are embedded directly in speech, without any modification of speech coder and transmission protocols. They are transmitted at 20 bps (without error correcting code) or 10 bps (with ECC). The steganographic link is resistant to speech compression (Speex coder 8000 bps), resampling and (under certain conditions) packet loss.
PL
Artykuł prezentuje przegląd współczesnych metod steganograficznych stosowanych w różnych zastosowaniach steganografii, takich jak: znakowanie wodne, tajna komunikacja, odciski palca, tworzenie ukrytych wolumenów danych. Każda grupa zastosowań została scharakteryzowana pod kątem wymagań kluczowych ze względu na pełnione funkcje.
EN
Some modern steganographic techniques are presented in the article. These methods can be used for various purposes: hidden communication, watermark-ing, fingerprinting, hidden data volumes creation. The most important requirements for each of the above applications were examined and are presented.
EN
This article illustrates the utilization of evaluation of images quality in accordance with the perception of human visual system and to determine the invisibility of distortions caused by the steganographic information hiding in digital color images. There is a possibility that the user could get certain level of invisibility through the use of blind assessment method. The image used for the purpose of steganography should be carefully chosen that steganographic information hiding could not be possible to visual detection [1].
PL
W artykule przedstawiono sposób wykorzystania ocen jakości obrazów zgodnych z percepcją ludzkiego systemu wzrokowego, do określania niewidoczności zniekształceń powodowanych przez steganograficzne ukrywanie informacji w kolorowych obrazach cyfrowych. Przez wykorzystanie metod oceny niewidoczności istnieje możliwość, aby użytkownik żądając otrzymania danego poziomu niewidoczności, otrzymywał ją. Obraz wykorzystywany w celach steganograficznych powinien być starannie wybierany, aby fakt steganograficznego ukrycia wiadomości, nie był możliwy do wizualnego wykrycia [1].
PL
W artykule przedstawiono propozycję algorytmu steganograficznego z kluczem rozproszonym dla cyfrowych środowisk graficznych, wykorzystującym znormalizowaną funkcję czułości kontrastu CSF jako kryterium oceny niewidoczności zmian wprowadzanych w obrazie wynikowych. Jako klucz rozproszony rozumie się klucz stosowany na każdym etapie ukrywania wiadomości. Przeprowadzono analizę efektywności proponowanego rozwiązania oraz przedstawiono próbę jego optymalizacji.
EN
The paper presents a proposition of the steganographic algorithm with dispersed key for digital images. This algorithm uses the normalized contrast sensitive function CSF. The CSF function is used as a measure criterion of invisibility changes in the output image. Choosing the images to hiding messages is realized according to the image characteristic measures. This parameter determines the invisibility level of changes in the output image. Some exemplary measures are: mean, variance, dispersion from colors histogram and entropy, homogenity from Co-Occurrence Matrix. A dispersed key is used at every stage of the hiding messages process. The proposed algorithm is based on the wavelet transform DWT. The key is used for selection of a container, random selection of the placement, selection of the wavelet function and wavelet coefficients. There was performed an analysis of the proposed solution efficiency. The attempt at optimizing the solution is presented in the paper. The database UCID was used for analysis of the efficiency. The proposed optimization resulted in four-time acceleration of the algorithm.
first rewind previous Strona / 2 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.